Tag
Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification
2 rules 3 TTPs 1 CVEThe Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.
Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)
2 rules 1 TTP 1 CVEThe Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.
Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)
2 rules 1 TTP 1 CVEA time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (<= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.
WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)
2 rules 1 TTP 1 CVEThe Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.
PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)
2 rules 1 TTP 1 CVEThe PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.
WP Editor Plugin CSRF Vulnerability
2 rules 1 TTP 1 CVEThe WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.
OpenClaw Plugin Archive Integrity Vulnerability (CVE-2026-42428)
2 rules 1 TTP 1 CVEOpenClaw versions before 2026.4.8 fail to enforce integrity verification on downloaded plugin archives, allowing attackers to install malicious plugins and compromise the local assistant environment.
WordPress HTTP Headers Plugin Remote Code Execution via File Path Manipulation (CVE-2026-4132)
2 rules 1 TTP 1 CVEThe HTTP Headers WordPress plugin is vulnerable to remote code execution (RCE) due to insufficient validation of the htpasswd file path and lack of sanitization of the username, allowing authenticated administrators to write arbitrary code to the server.
OpenClaw Improper Trust Boundary Vulnerability (CVE-2026-41295)
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.2 contains an improper trust boundary vulnerability (CVE-2026-41295) allowing attackers to execute unintended code by cloning a workspace with a malicious plugin claiming a bundled channel id.
Everest Forms Plugin Arbitrary File Read and Deletion Vulnerability
2 rules 3 TTPs 1 CVEThe Everest Forms plugin for WordPress is vulnerable to arbitrary file read and deletion, allowing unauthenticated attackers to access sensitive data or cause denial of service by manipulating the 'old_files' parameter in versions up to 3.4.4.
WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability
2 rules 1 TTP 1 CVEThe WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.
Plisio Accept Cryptocurrencies Plugin Missing Authorization Vulnerability (CVE-2026-6372)
2 rules 1 TTP 1 CVE 1 IOCA missing authorization vulnerability in the Plisio Accept Cryptocurrencies with Plisio WordPress plugin (versions up to 2.0.5) allows attackers to bypass payment verification due to incorrectly configured access control security levels.
Riaxe Product Customizer WordPress Plugin SQL Injection Vulnerability
2 rules 1 TTP 1 CVEThe Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter within 'product_data' of the `/wp-json/InkXEProductDesignerLite/add-item-to-cart` REST API endpoint, allowing unauthenticated attackers to extract sensitive information from the database.
Riaxe Product Customizer WordPress Plugin Privilege Escalation Vulnerability (CVE-2026-3596)
2 rules 2 TTPs 1 CVEThe Riaxe Product Customizer plugin for WordPress is vulnerable to privilege escalation, allowing unauthenticated attackers to update arbitrary WordPress options via a publicly accessible AJAX endpoint and escalate privileges to administrator.
LearnPress WordPress Plugin Unauthorized Data Deletion Vulnerability (CVE-2026-4365)
2 rules 1 TTP 1 CVEThe LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function, allowing unauthenticated attackers to delete quiz answer options.
Helm Plugin Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.
wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)
2 rules 1 TTP 1 CVEThe wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.
Gravity SMTP Plugin Missing Authorization Vulnerability (CVE-2026-4162)
2 rules 1 TTP 1 CVEThe Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization, allowing authenticated attackers with subscriber-level access or higher to uninstall/deactivate the plugin and delete plugin options, and is also exploitable via Cross-Site Request Forgery.
Smart Slider 3 Pro Compromised Update Leads to Remote Code Execution
3 rules 9 TTPs 1 CVESmart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system allowing unauthenticated remote code execution and system takeover.
WooCommerce Ajax Product Filter Plugin Vulnerable to SQL Injection (CVE-2026-3396)
2 rules 1 TTP 1 CVEThe WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection (CVE-2026-3396) due to insufficient escaping and SQL query preparation, allowing unauthenticated attackers to extract sensitive information from the database in versions up to 4.2.3.
WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps
2 rules 2 TTPs 1 CVEThe Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.
WordPress Widgets for Social Photo Feed Plugin Stored XSS Vulnerability
2 rules 1 TTP 1 CVEThe Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'feed_data' parameter, allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute when a user accesses the injected page.
ProfilePress WordPress Plugin Membership Payment Bypass Vulnerability
2 rules 1 TTP 1 CVEThe ProfilePress WordPress plugin before 4.16.12 is vulnerable to an unauthorized membership payment bypass, allowing authenticated attackers to obtain paid memberships without payment by manipulating subscription IDs during checkout.
Blackhole for Bad Bots WordPress Plugin Stored XSS Vulnerability
2 rules 1 TTPThe Blackhole for Bad Bots WordPress plugin through version 3.8 is vulnerable to stored cross-site scripting (XSS) via the User-Agent HTTP header, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the plugin's admin page.
WP Job Portal Plugin SQL Injection Vulnerability
2 rules 1 TTPThe WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter, allowing unauthenticated attackers to extract sensitive database information in versions up to 2.4.8.
Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)
3 rules 1 TTP 1 CVECVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.
Breeze Cache Plugin Arbitrary File Upload Vulnerability (CVE-2026-3844)
2 rules 1 TTP 1 CVEThe Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.
Royal Elementor Addons Plugin SSRF Vulnerability
2 rules 1 TTP 1 CVEThe Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.
WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)
2 rules 1 TTP 1 CVEThe Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.
WordPress Profile Builder Pro Plugin PHP Object Injection Vulnerability (CVE-2026-7647)
2 rules 1 TTP 1 CVEAn unauthenticated PHP Object Injection vulnerability exists in the Profile Builder Pro WordPress plugin (versions up to 3.14.5) due to the insecure use of `maybe_unserialize()` on the 'args' POST parameter in the `wppb_request_users_pins_action_callback()` AJAX handler, potentially leading to arbitrary code execution.
ExactMetrics WordPress Plugin Vulnerability Leads to Remote Code Execution
2 rules 4 TTPs 1 CVEThe ExactMetrics plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation via a REST API endpoint, potentially leading to remote code execution by authenticated attackers.